Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 03:37

General

  • Target

    b29ff36a0618230a920cd9294a7ca770N.exe

  • Size

    101KB

  • MD5

    b29ff36a0618230a920cd9294a7ca770

  • SHA1

    0e0b512aa57a268c7cfc2bef23ca5e371cf41251

  • SHA256

    13d717c445b2b41d79a0def49eefe9d3fb1c36beaa6bcf4c68bd6dbaa860b472

  • SHA512

    0cb700d9059e0c00d53f98ec39aac8cab191739a6e1c270888eb2e7f7054a637e423c85afb63bc21f54ffc16219c786b39ee7581d9e576494f0729d0a6bdd1ae

  • SSDEEP

    1536:W7ZDpApYbWjIoPyPoLzV7c6ShZQ4PN54PNwYHB10YHB1Rfm:6DWp4W6YHB10YHB1Rfm

Score
9/10

Malware Config

Signatures

  • Renames multiple (317) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b29ff36a0618230a920cd9294a7ca770N.exe
    "C:\Users\Admin\AppData\Local\Temp\b29ff36a0618230a920cd9294a7ca770N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    8b1fb9674e81a1a5cfb6a647044123f5

    SHA1

    a0191b71c8b941daa1b1ecd5667c417b4815bb43

    SHA256

    c09028641510a64ecf366f0538dd09af04aad5d2a68bf10efc519d4046c18b67

    SHA512

    8fa13b98c43e457004d3e496ffabe79702a284509e10c3b256e461d2ed810e6f90464d08cc8df144114eb4bd4db1e16be93e8d21a490dd53b1bba5ebd6ba073d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    111KB

    MD5

    5e75baeacce8dab72b3ee184bcd3c392

    SHA1

    b75d005789e857cf51bc0e54f5929dd0144b7a1b

    SHA256

    d33c9eaa5ef548769eca4389cc8f29071ea52e7a34b5ac9b79e2f4e66c6c92a7

    SHA512

    3a032ffeb43d0e97879a6136e2262d6256cced10fd696193512fbc20609915984f0526909c8adff9c27a996db8e51131606e3f1ba186c1ca9e469c231ae93f29